Yingfei Dong

ORCID: 0000-0003-2371-1043
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Internet Traffic Analysis and Secure E-voting
  • Network Security and Intrusion Detection
  • Caching and Content Delivery
  • Peer-to-Peer Network Technologies
  • Network Traffic and Congestion Control
  • Advanced Malware Detection Techniques
  • Smart Grid Security and Resilience
  • Spam and Phishing Detection
  • Cryptography and Data Security
  • Advanced Wireless Network Optimization
  • Complex Network Analysis Techniques
  • Multimedia Communication and Technology
  • Opinion Dynamics and Social Influence
  • Video Coding and Compression Technologies
  • Security and Verification in Computing
  • Image and Video Quality Assessment
  • Interconnection Networks and Systems
  • Privacy-Preserving Technologies in Data
  • Mobile Agent-Based Network Management
  • Software-Defined Networks and 5G
  • IPv6, Mobility, Handover, Networks, Security
  • Cloud Data Security Solutions
  • Anomaly Detection Techniques and Applications
  • Guidance and Control Systems
  • Parallel Computing and Optimization Techniques

University of Hawaii System
2014-2024

University of Hawaiʻi at Mānoa
2004-2024

China Railway Group (China)
2024

Shandong Agricultural University
2021

University of Minnesota
1997-2003

University of Minnesota System
2002

The University of Texas Medical Branch at Galveston
1995

Compromised machines are one of the key security threats on Internet; they often used to launch various attacks such as spamming and spreading malware, DDoS, identity theft. Given that provides a economic incentive for attackers recruit large number compromised machines, we focus detection in network involved activities, commonly known spam zombies. We develop an effective zombie system named SPOT by monitoring outgoing messages network. is designed based powerful statistical tool called...

10.1109/tdsc.2011.49 article EN IEEE Transactions on Dependable and Secure Computing 2011-10-13

Classifying encrypted traffic is critical to effective network analysis and management. While traditional payload- based methods are powerless deal with traffic, machine learning have been proposed address this issue. However, these often bring heavy overhead into the system. In paper, we propose a hybrid method that combines signature-based statistical We first identify SSL/TLS signature matching methods, then apply determine concrete application protocols. Our experimental results show...

10.1109/glocom.2010.5683649 article EN 2010-12-01

In this paper, we propose a new SPNR model and identify the concrete propagation relationships obtain spreading threshold. We evaluate proposed with simulations compare simulation results real data on Sina Weibo, largest micro-blogging tool in China. The show that is effective for capturing rumor social networks. To control strategy, further analyze key factors affect maximum value of steady state, point decline, life cycle rumor. These help us develop strategies.

10.1145/2492517.2492599 article EN 2013-08-25

Searchable Encryption (SE) has been extensively examined by both academic and industry researchers. While many SE schemes show provable security, they usually expose some query information (e.g., search access patterns) to achieve high efficiency. However, several inference attacks have exploited such leakage, e.g., a recovery attack can convert opaque trapdoors their corresponding keywords based on prior knowledge. On the other hand, proposed require significant modification of existing...

10.1109/access.2017.2786026 article EN cc-by-nc-nd IEEE Access 2017-12-27

Network traffic classification is critical to both network management and system security. However, existing techniques become less effective as more P2P applications use proprietary protocols for delivery encryption. Especially, current usually focus on individual flows do not consider all associated with an application together. To address this issue, paper proposes a novel Application Behavior Characterization (ABC) technique. We design behavior feature extracting method algorithm, which...

10.1109/iccnc.2014.6785298 article EN 2016 International Conference on Computing, Networking and Communications (ICNC) 2014-02-01

Abstract A survey of papers in the ASEE Multidisciplinary Engineering Division over last three years shows main areas emphasis: individual courses; profiles specific projects; and capstone design courses. However, propagating multidisciplinary education across vast majority disciplines offered at educational institutions with varying missions requires models that are independent disciplines, programs, which they were originally conceived. Further, can propagate must be cost effective,...

10.18260/1-2--29103 article EN 2018-05-10

Freenet is a popular peer to anonymous network, with the objective provide anonymity of both content publishers and retrievers. Despite more than decade active development deployment adoption well-established cryptographic algorithms in Freenet, it remains unanswered how well initial design has been met. In this paper we develop traceback attack on show that originating machine request message can be identified; is, retriever broken, even if single issued by retriever. We present attack,...

10.1109/infcom.2013.6566978 article EN 2013-04-01

Although consumer drones have been used in many attacks, besides specific methods such as jamming, very little research has conducted on systematical to counter these drones. In this paper, we develop generic compromise drone position control algorithms order make malicious deviate from their targets. Taking advantage of existing remotely manipulate sensors through cyber or physical attacks (e.g., [1], [2]), exploited the weaknesses estimation and autopilot controller proposed attacks. For...

10.1109/cns.2019.8802817 article EN 2019-06-01

Although some existing counterdrone measures can disrupt the invasion of certain consumer drone, to best our knowledge, none them accurately redirect it a given location for defense. In this paper, we proposed Drone Position Manipulation (DPM) attack address issue by utilizing vulnerabilities control and navigation algorithms used on drones. As such drones usually depend GPS autopiloting, carefully spoof signals based where want drone to, that indirectly affect its position estimates are...

10.1109/ccnc49033.2022.9700664 article EN 2022-01-08

In this paper, we propose a Loopback approach in two-level streaming architecture to exploit collaborative client/proxy buffers for improving the quality and efficiency of large-scale applications. At upper level use content delivery network (CDN) deliver video from central server proxy servers. lower delivers with help client caches. particular, its clients local domain cache different portions form loops. each loop, single stream originates at proxy, passes through number clients, finally...

10.1109/tmm.2005.864277 article EN IEEE Transactions on Multimedia 2006-03-22

Searchable encryption (SE) schemes, such as those deployed for cyber-physical social systems, may be vulnerable to inference attacks. In attacks, attackers seek learn sensitive information about the queries and data stored on (cyber-physical social) systems. However, these attacks are often based strong (impractical) assumptions (e.g., complete knowledge of documents or known document injection) using access-pattern leakage. this paper, we first identify different leakage models profiles...

10.1109/access.2018.2800684 article EN cc-by-nc-nd IEEE Access 2018-01-01

DoS is still one of the most serious attacks on Internet. Payload-based approaches are effective to known DOS but unable be deployed high-speed networks. To address this issue, flow-based detection schemes have been proposed for highspeed networks as an supplement payload-based solutions. However, existing solutions limitations in detecting unknown and efficiently identifying real attack flows buried background traffic. In addition, also difficulty adapt dynamics. these issues, paper...

10.1109/ccis.2012.6664254 article EN 2012-10-01

Freenet is a popular peer to anonymous content-sharing network, with the objective provide anonymity of both content publishers and retrievers. Despite more than decade active development deployment adoption well-established cryptographic algorithms in Freenet, it remains unanswered how well initial design has been met. In this paper we develop traceback attack on show that originating machine request message can be identified; is, retriever broken, even if single issued by retriever. We...

10.1109/tdsc.2015.2453983 article EN publisher-specific-oa IEEE Transactions on Dependable and Secure Computing 2015-01-01

While more and consumer drones are abused in recent attacks, there is still very little systematical research on countering malicious drones. In this paper, we focus issue develop effective attacks to common autopilot control algorithms compromise the flight paths of autopiloted drones, e.g., leading them away from its preset paths. We consider attacking an drone three phases: onboard sensors, state estimation, algorithms. Several first-phase have been developed (e.g., [1]-[4]); second-phase...

10.1109/icuas.2019.8798162 article EN 2022 International Conference on Unmanned Aircraft Systems (ICUAS) 2019-06-01

The precise forecasting of wind speeds is critical to lessen the harmful impacts fluctuations on power networks and aid in merging energy into grid system. However, prior research has predominantly focused point forecasts, often overlooking uncertainties inherent prediction accuracy. For this research, we suggest a new approach for speed intervals (PI). Specifically, actual series are initially procured, complete ensemble empirical mode decomposition coupled with adaptive noise (CEEMDAN)...

10.3390/atmos15030294 article EN cc-by Atmosphere 2024-02-28

Previous vibration-based damage detection studies mostly focus on developing a more sensitive optimization function to promote the effectiveness of identification. However, few have conducted comparative analyses performance different functions. In study, changes in frequency and mode shape are applied as inputs functions for Three established using residuals, combinations modal flexibility respectively. Considering sparsity element distribution, an iterative reweighted [Formula: see text]...

10.1142/s0219455425500233 article EN International Journal of Structural Stability and Dynamics 2024-02-21

As many mobile devices use Global Navigation Satellite Systems (GNSSs) to determine their locations for control, compromising such systems can result in serious consequences, as shown by existing GPS spoofing attacks. However, most attacks focus on the effect of a single spoofer attacking receiver. In this paper, we investigate impacts multiple receivers, motivated research drone swarms. Our analysis independently shows that, using spoofer, receivers at different area will see same location...

10.1109/ccnc51664.2024.10454872 article EN 2024-01-06

To address fast-increasing security incidents of drones, in this paper, we investigate fundamental solutions to defend against unsophisticated commercial drones. We have examined several common flight control and navigation algorithms identified weaknesses the prevalent EKF-based dynamic state estimation schemes. Exploiting unique circumstances characteristics these drone algorithms, developed a theoretical framework False Data Injection (FDI) specific estimation, different from existing FDI...

10.1109/cns.2018.8433205 article EN 2018-05-01
Coming Soon ...